IEEE 2016-2017
PROJECTS Technology: JAVA (J2SE & J2EE)
S. No /
PROJECT TITLES
1 / Trust Agent-Based Behavior Induction in Social Networks
2 / Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
3 / Data Lineage in Malicious Environments
4 / ID2S Password Authenticated key exchange protocol
5 / Profiling Online Social Behaviors for Compromised Account Detection
6 / Quantifying Political Leaning from Tweets, Re tweets, and Re tweeters
7 / Connecting Social Media to E-Commerce Cold-Start Product Recommendation Using Micro blogging Information
8 / A Novel Recommendation Model Regularized with User Trust and Item Ratings
9 / Automatically Mining Facets for Queries from Their Search Results
10 / Inverted Linear Quad tree: Efficient Top K Spatial Keyword Search
11 / KNNVWC An Efficient k-Nearest Neighbors Approach Based on Various-Widths Clustering
12 / Location Aware Keyword Query Suggestion Based on Document Proximity
13 / Mining User-Aware Rare Sequential Topic Patterns in Document Streams
14 / Nearest Keyword Set Search in Multi-Dimensional Datasets
15 / Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
16 / Topic Sketch Real-time Bursty Topic Detection from Twitter
17 / Top-k Dominating Queries on Incomplete Data
18 / Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
19 / User-Service Rating Prediction by Exploring Social Users' Rating Behaviors
20 / Data Lineage in Malicious Environments
21 / Mitigating Cross-Site Scripting Attacks with a Content Security Policy
22 / Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
23 / Social Friend Recommendation Based on Multiple Network Correlation
24 / User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors
25 / FRODO: Fraud Resilient Device for Off-line micro-payments
26 / Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
27 / Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
28 / Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
29 / Learning to Rank Image Tags With Limited Training Examples
30 / Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
31 / Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
32 / A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services
33 / Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
34 / Detecting Malicious Face book Applications
35 / Key Updating for Leakage Resiliency with Application to AES Modes of Operation
36 / Booster in High Dimensional Data Classification
37 / Efficient Cache-Supported Path Planning on Roads
38 / Top-Down XML Keyword Query Processing
39 / Understanding Short Texts through Semantic Enrichment and Hashing
40 / Building an intrusion detection system using a filter-based feature selection algorithm
41 / Domain-Sensitive Recommendation with User-Item Subgroup Analysis
42 / Relevance Feedback Algorithms Inspired By Quantum Detection
43 / A Stable Approach for Routing Queries in Unstructured P2P Networks
44 / Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
45 / Profiling Online Social Behaviors for Compromised Account Detection
46 / I Path: Path Inference in Wireless Sensor Networks
47 / A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
48 / Online Multi-Modal Distance Metric Learning with Application to Image Retrieval
49 / Tag Based Image Search by Social Re-ranking
50 / Learning of Multimodal Representations With Random Walks on the Click Graph
51 / Detection And Localization Of Multiple Spoofing
52 / A Proximity-Aware Interest-Clustered P2P File Sharing System
53 / User-Defined Privacy Grid System for Continuous Location-Based Services
54 / Continuous and Transparent User Identity Verification for Secure Internet Services
55 / DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
56 / Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
57 / Effective Key Management in Dynamic Wireless Sensor Networks
58 / An Attribute-Assisted Re ranking Model for Web Image Search
59 / EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
60 / Security-Evaluation-Of-Pattern-Classifiers-Under-Attack
JAVA ANDROID PROJECTS
ENVIRONMENT DETAILS:ANDROID,SQLITE
S. No / PROJECT TITLES
1 / A Location- and Diversity-aware News Feed System for Mobile Users
2 / Context-Based Access Control Systems for Mobile Devices
3 / Cooperative Positioning and Tracking in Disruption Tolerant Networks
4 / CWC: A Distributed Computing Infrastructure Using Smartphone’s
5 / Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile
6 / Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications
7 / Privacy-Preserving Relative Location Based Services for Mobile Users
8 / The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps
9 / Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds
10 / User Privacy and Data Trustworthiness in Mobile Crowd Sensing
11 / User-Defined Privacy Grid System for Continuous Location-Based Services
12 / Effective Risk Communication for Android Apps
13 / Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
14 / Meet You – Social Networking on Android
15 / MOSES: Supporting and Enforcing Security Profiles on Smart phones
16 / T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence
CLOUD COMPUTING
Technology:JAVA,J2EE&MYSQL
S. No / PROJECT TITLES
1 / A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
2 / A Secure and Dynamic Multi-keyword Ranked Search Scheme
3 / Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
4 / Audit-Free Cloud Storage via Deniable Attribute-based Encryption
5 / Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
6 / Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
7 / Identity-Based Encryption with Outsourced Revocation in Cloud Computing
8 / Provable Multi copy Dynamic Data Possession in Cloud Computing Systems
9 / DeyPoS De duplicatable Dynamic Proof of Storage for Multi-User Environments
10 / Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
11 / Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
12 / Providing User Security Guarantees in Public Infrastructure Clouds
13 / EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud
14 / Dynamic and Public Auditing with Fair Arbitration for Cloud Data
15 / An Efficient Privacy-Preserving Ranked Keyword Search Method
16 / Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
17 / Malware Detection in Cloud Computing Infrastructures
18 / Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
19 / Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
20 / Identity-Based Encryption with Cloud Revocation Authority and Its Applications
21 / Fine Grained Two Factor Access Control for Web Based Cloud Computing Services
22 / Cloud workflow scheduling with deadlines and time slot availability
23 / Cloud Armor Supporting Reputation-based Trust Management for Cloud Services
24 / Privacy Preserving Ranked Multi Keyword Search for Multiple Data Owners in Cloud Computing
25 / Enabling Fine-grained Multi-keyword Search Supporting Classified Sub dictionaries over Encrypted Cloud Data
26 / Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
27 / Two Factor Data Security Protection Mechanism for Cloud Storage System
28 / A Privacy Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains
29 / Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
30 / PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
WEB APPLICATIONS
Technology: JAVA J2EE,TOMCAT,ORACLE
S. No / PROJECT TITLES
1 / Advanced Google map For even Management System
2 / Graphical Representation of Sorting Algorithm
3 / Students Bus Pass Reservation System
4 / DVD-Rental System
5 / Profile Evolution Technique
6 / Business Directory Search and add Business in your city
7 / E-Dues Online Due Date Reminders
8 / E-Print Order For stationery Shop
9 / Health care for you 24x7 medical helpline
10 / Offers A Marketing Challenge
11 / Performance Analyzer How is Your Employee Performing
12 / RTO management System
13 / Shaadi Shopping Online Shopping
14 / Video Hub Video management System
15 / Map-Reduction In java
16 / Pattern Matching Algorithms
17 / Mentors & Proteges Empowering Women
18 / Fighting Hunger
19 / Online student feedback system
20 / Hybrid-Book Collection Management System
21 / An Intelligent Heart Disease Prediction System sing K-Means Clustering and Naïve Bayes Algorithm
22 / Secure Cloud Computing through Homomorphic Encryption
23 / Implementation of Cloud Storage System using Multiple Cloud Services
24 / Fraud Detection In E-Shopping
25 / Car Parking System using Bar Code Reader
Technology: DOTNET
IEEE PROJECTS
S. No / PROJECT TITLES
01 / Efficient Certificate less Access Control for Wireless Body Area Networks
02 / Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage
03 / Geographic and Opportunistic Routing for Underwater Sensor Networks
04 / Optimizing Cost for Online Social Networks on Geo-Distributed Clouds
05 / Secure and Efficient data communication protocol for Wireless Body Area Networks
06 / Authenticated Key Exchange Protocols for Parallel Network File System
07 / Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
08 / Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
09 / Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data
10 / Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
11 / Content-Adaptive Steganography by Minimizing Statistical Detectability
12 / ID2S Password-Authenticated Key Exchange Protocols
13 / Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
14 / Authenticated Key Exchange Protocols for Parallel Network File Systems
15 / A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor Networks
16 / DAGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks
17 / Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
18 / Traffic Décor relation Techniques for Countering a Global Eavesdropper in WSNs
19 / WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
20 / A Mixed Generative-Discriminative Based Hashing Method
21 / Text Mining the Contributors to Rail Accidents
22 / Optimal Content Downloading in Vehicular Networks
23 / A Cocktail Approach for Travel Package Recommendation
24 / An Empirical Performance Evaluation of Relational Keyword Search Techniques
25 / LARS*: An Efficient and Scalable Location-Aware Recommender System
26 / Product Aspect Ranking and Its Applications
27 / Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
28 / Secure Mining of Association Rules in Horizontally Distributed Databases
29 / Supporting Privacy Protection in Personalized Web Search
30 / Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
31 / Typicality-Based Collaborative Filtering Recommendation
32 / Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic Traffic
33 / Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
34 / An Error-Minimizing Framework for Localizing Jammers in Wireless Networks
35 / Certificate less Remote Anonymous Authentication Schemes for Wireless Body Area Networks
36 / Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
37 / Multicast Capacity in MANET with Infrastructure Support
38 / Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing
39 / Autonomous Mobile Mesh Networks
40 / Preserving Location Privacy in Geosocial Applications
41 / EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
42 / User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors
43 / Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
44 / Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
45 / KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
CLOUD COMPUTING
01 / Dynamic and Public Auditing with Fair Arbitration for Cloud Data
02 / Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
03 / Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
04 / Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
05 / Leveraging Data De duplication to Improve the Performance of Primary Storage Systems in the Cloud
06 / MMB cloud-tree: Authenticated Index for Verifiable Cloud Service Selection
07 / Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
08 / Content-Adaptive Steganography by Minimizing Statistical Detectability
09 / Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
10 / EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
11 / Discovery of Ranking Fraud for Mobile Apps
12 / CAM: Cloud-Assisted Privacy Preserving Mobile
Health Monitoring
13 / MONA- secures multi owner data sharing for dynamic groups in the cloud.
14 / PSMA-patient self-Controllable and multi-level privacy preserving cooperative authentication in distributed healthcare cloud computing.
15 / Balancing performance, accuracy and precision for secure cloud transactions.
16 / Consistency as a Service: Auditing Cloud Consistency
17 / Privacy-Preserving Public Auditing for Secure Cloud Storage
18 / Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
19 / Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud data.
20 / Cloud Based Multimedia content protection system.
21 / Identity-Based distributed provable data possession in multi cloud storage.
22 / Key aggregate cryptosystem for scalable data sharing in cloud storage.
23 / Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
24 / Decentralized access control with anonymous authentication of data stored in clouds.
25 / Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
WEB APPLICATIONS
01 / Cybernetics protector.
02 / Digital Eye.
03 / Error Tracking System.
04 / Expert answer.
05 / Asset boutique.
06 / Village morphogenesis.
07 / E-Budget.
08 / Air freight carrier.
09 / Census.
10 / Web pool processor.
11 / Smart knowledge provider.
12 / Logistic data system.
13 / Secure data communication.
14 / Vehicle hiring system.
15 / Inventory control system.
16 / Wealth bridging.
17 / Neural network for Unicode optical character recognition.